#VU21970 Improper access control in Siemens Hardware solutions


Published: 2019-10-21

Vulnerability identifier: #VU21970

Vulnerability risk: Medium

CVSSv3.1: 5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C]

CVE-ID: CVE-2019-10943

CWE-ID: CWE-284

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
SIMATIC S7-PLCSIM Advanced
Server applications / SCADA systems
SIMATIC S7-1500 Software Controller
Server applications / SCADA systems
SIMATIC ET 200SP Open Controller
Server applications / SCADA systems
SIMATIC S7-1500 CPU
Hardware solutions / Firmware
SIMATIC S7-1200
Hardware solutions / Firmware

Vendor: Siemens

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker with network access to port 102/tcp can modify the user program stored on the affected devices such that the source code differs from the actual running code and gain unauthorized access to the application.

This vulnerability affects the following products:

  • SIMATIC ET 200SP Open Controller CPU 1515SP PC (All versions)
  • SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (All versions)
  • SIMATIC S7-1200 CPU family (All versions >= V4.0)
  • SIMATIC S7-1500 CPU family (All versions)
  • SIMATIC S7-1500 Software Controller (All versions)
  • SIMATIC S7-PLCSIM Advanced (All versions)

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

SIMATIC S7-PLCSIM Advanced: All versions

SIMATIC S7-1500 Software Controller: All versions

SIMATIC S7-1500 CPU: All versions

SIMATIC S7-1200: 2.00 - 4.0

SIMATIC ET 200SP Open Controller: All versions


External links
http://cert-portal.siemens.com/productcert/pdf/ssa-232418.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability